{"id":58075,"date":"2019-02-15T00:00:00","date_gmt":"2019-02-14T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/25-cyber-threats-to-fear\/"},"modified":"2021-06-07T09:53:23","modified_gmt":"2021-06-07T07:53:23","slug":"25-cyber-threats-to-fear","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/","title":{"rendered":"25 cyber-threats to fear"},"content":{"rendered":"<p>Connectedness is the future \u2013 our homes, organisations, and even entire cities have undergone an extreme smart tech transformation in recent years. Intelligent infrastructure facilitates increasing digitalisation, and we\u2019re swiftly abandoning outdated practices, replacing them with ever more efficient ones. Paperwork is increasingly replaced with digital files and the gathered data is stored on various cloud storage systems. Moving highly valuable and confidential data to virtual storage, however, isn\u2019t without risk.<\/p>\n<figure id=\"attachment_40984\" aria-describedby=\"caption-attachment-40984\" style=\"width: 400px\" class=\"wp-caption alignright\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-40984\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Engl.jpg\" alt=\"Image showing how much organisations will spend on cyber security by 2020\" width=\"400\" height=\"263\" \/><figcaption id=\"caption-attachment-40984\" class=\"wp-caption-text\">By 2020, nearly $102 billion is expected to be spent by organisations on cybersecurity software, hardware, and services for protection against cyber-threats.<\/figcaption><\/figure>\n<p>We do have strong passwords, firewalls, and software that enables smart homes and internet security and guards data from malicious attacks. But <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/keynote\/the-future-of-cybercrime-and-terrorism\/\">cybercrime<\/a> keeps rising, causing immense damage that\u2019s <a href=\"https:\/\/preyproject.com\/blog\/en\/24-cybersecurity-statistics-that-matter-in-2019\/\">expected<\/a> to reach $6 trillion annually by 2021. Unfortunately, the list of companies that experienced some type of cyber-attack is growing, and investing in cybersecurity is definitely the way to go. According to International Data Corporation projections, organisations \u201care expected to spend $101.6 billion on cyber security software, services, and hardware to combat these potential threats\u201d by 2020, <em>Forbes<\/em> <a href=\"https:\/\/www.forbes.com\/sites\/stevencress\/2018\/07\/24\/four-stocks-to-leverage-the-cyber-security-craze\/#6caf41ec6c4a\">reports<\/a>.<\/p>\n<p>As new tech and new protection systems emerge, cyber criminals keep figuring out novel ways to outsmart them. However, there are ways in which we can protect ourselves. For instance, detecting vulnerabilities and implementing cyber protection on time can help both individuals and organisations to live and conduct business in safer and more secure digital ecosystems. That\u2019s why we\u2019ve gathered and analysed the potential cyber-threats lurking behind exciting technologies that, in most cases, aren\u2019t immune to malware.<\/p>\n<h2>1. 5G technology brings cybersecurity threats<\/h2>\n<p>The fifth generation of wireless systems and networks, also referred to as 5G, is exciting technology. Its super-fast internet connectivity will certainly make our lives easier, and people worldwide simply can\u2019t wait to embrace it. As Ericsson <a href=\"http:\/\/www.eweek.com\/mobile\/5g-service-will-cover-40-of-world-s-population-by-2024-ericsson\">predicts<\/a>, 40 per cent of the global population will be using 5G by 2024. For all the hype and excitement around this tech, however, there\u2019s an equal number of concerns. As advances in <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/blog\/5g-internet-connectivity-future\/\">5G technology<\/a> speed up the rate of IoT deployment, and as the IoT grows and more devices get connected to the internet, we\u2019re under greater risk of cyber-threats. The reason for this is simple. While IoT tech manufactures are mostly focused on launching new products quickly, they often don\u2019t pay enough attention to cybersecurity. And poor security is what makes IoT devices the perfect target for cyber-criminals. In fact, in 2018, <a href=\"https:\/\/www.telecomstechnews.com\/news\/2018\/dec\/05\/nokia-report-5g-iot-botnets-worse\/\">78 per cent<\/a> of malware incidents were related to communication networks that involve IoT technology.<\/p>\n<h2>2. Social media is becoming a political instrument<\/h2>\n<p>Social media platforms have become part of our daily routine. For most people, checking Instagram or Facebook first thing in the morning has become the norm. And the popularity of social media is showing no signs of abating. <em>Forbes<\/em> <a href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/05\/21\/how-much-data-do-we-create-every-day-the-mind-blowing-stats-everyone-should-read\/#506d4a5260ba\">reports<\/a> that Facebook, the largest social media platform in the world, has two billion users. In fact, every second, five new Facebook accounts are created. But what started as a harmless technology is now increasingly regarded as more dangerous than initially thought. <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/08\/suspected-iranian-influence-operation.html\">According to<\/a> the cybersecurity company FireEye, social media can also be used to promote potentially dangerous political interests. For instance, it discovered several social media accounts that have been promoting Iranian political interests among audiences in the US, the UK, Latin America, and the Middle East. The content was mostly dealing with anti-Saudi and anti-Israel topics and was supporting the US-Iran nuclear deal. FireEye <a href=\"https:\/\/www.menaherald.com\/en\/business\/media-marketing\/fireeye-experts-predict-social-media-will-play-critical-role-regional-cyber\">believes<\/a> that social media will continue to be used as a tool to promote the political interests of foreign countries. And it\u2019s not hard to understand how this development can potentially lead to serious conflicts.<\/p>\n<figure id=\"attachment_39069\" aria-describedby=\"caption-attachment-39069\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-39069 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Social-media-is-becoming-a-political-instrument.jpg\" alt=\"A keyboard with several letters replaced by icons for Facebook, Instagram, and two other companies. \" width=\"800\" height=\"526\" \/><figcaption id=\"caption-attachment-39069\" class=\"wp-caption-text\">According to the cybersecurity company FireEye, social media can also be used to promote potentially dangerous political interests.<\/figcaption><\/figure>\n<h2>3. Taking down the internet<\/h2>\n<p>The majority of internet services we use on a daily basis are vulnerable to attacks, enabling cybercriminals to hack into systems and even take down the internet. This will continue to be an issue in the future as well. As Norton <a href=\"https:\/\/us.norton.com\/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that-you-should-know.html\">predicts<\/a>, 33 billion personal records will be affected by cyber-attacks in 2023, compared to 12 billion in 2018. Moreover, Cybint Solutions <a href=\"https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/\">reveals<\/a> that every year, one in three Americans are affected by a cyber incident. Clearly, cyber-attacks are becoming all too common. In fact, it\u2019s been <a href=\"https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/\">reported<\/a> there\u2019s a cyber-attack every 39 seconds. Since they\u2019re becoming more sophisticated, they pose a significant threat to our society, and no one is safe. One terrifying <a href=\"https:\/\/www.secplicity.org\/2018\/12\/03\/2019-security-predictions-attackers-hold-the-internet-hostage\/\">example<\/a> is the distributed denial-of-service (DDoS) attack in 2016 that took down many major websites such as Amazon, Twitter, and even <em>CNN<\/em>.<\/p>\n<figure id=\"attachment_40995\" aria-describedby=\"caption-attachment-40995\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-40995\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Engl2.jpg\" alt=\"Chart showing the industries most affected by DDoS cyber-attacks in 2018, as well as the number of attacks and the size of the largest attack per industry.\" width=\"800\" height=\"258\" \/><figcaption id=\"caption-attachment-40995\" class=\"wp-caption-text\">The chart shows that the largest DDoS attack in 2018 occurred in wired telecommunications carriers, and this industry also suffered the highest number of attacks at 793,377, followed by telecommunications and data processing\/hosting, while software publishers were the least affected with the smallest attacks and lowest number of attacks.<\/figcaption><\/figure>\n<p>More serious DDoS attacks could cause even greater devastation. Just imagine not being able to access <em>any<\/em> website on the internet. The reason why most existing websites are vulnerable is because the Border Gateway Protocol (BGP), which drives the internet and transfers routing data between different networks, was never really designed with security in mind. BGP allows networks and autonomous systems to communicate with each other. To make this process highly secure, network operators use Route Origin Validation \u2013 cryptographically coded route data deployed to protect autonomous systems and networks from route hijacking. However, only <a href=\"https:\/\/www.secplicity.org\/2018\/12\/03\/2019-security-predictions-attackers-hold-the-internet-hostage\/\">0.1 per cent<\/a> of existing autonomous systems have deployed Route Origin Validation, while the other 99.9 per cent are at great risk of being hacked.<\/p>\n<h2>4. Phishing attacks are gaining traction<\/h2>\n<p>Online shopping brings us convenience, but it also creates opportunities for scammers. Phishing scams, for instance, <a href=\"https:\/\/www.usatoday.com\/story\/money\/2018\/10\/24\/investigation-online-phishing-attacks-up-297-percent\/1741033002\/\">targeted<\/a> at capturing sensitive information like credit card numbers and passwords, are becoming a major threat. This is particularly evident in the retail world. It\u2019s <a href=\"https:\/\/www.usatoday.com\/story\/money\/2018\/10\/24\/investigation-online-phishing-attacks-up-297-percent\/1741033002\/\">estimated<\/a> that from 2017 to 2018, the number of retail phishing websites grew by 297 per cent. Phishing scams don\u2019t involve much effort to lure the target, because scammers mostly use emails as bait. Once victims receive an email featuring a link to a website that imitates a real company, they&#8217;re already one step closer to being scammed. After they reveal their credit card information or social security number, the consequences can be devastating. The best way to protect yourself is quite simple: don\u2019t click on every link that\u2019s been sent to you, or at least think before you click.<\/p>\n<h2>5. Spear phishing is an even more sophisticated hacking technique<\/h2>\n<p>As phishing attacks become more sophisticated, it\u2019s easy to become a victim of these scams. To make their scams more believable, criminals no longer rely only on sending spam emails to a wide range of users, hoping to attract someone\u2019s interest and capture valuable information. Today\u2019s scammers are a lot smarter, and their more advanced techniques consists of finding information about potential targets through companies\u2019 official websites and social media platforms. Also <a href=\"https:\/\/www.rapid7.com\/fundamentals\/spear-phishing-attacks\/\">known as<\/a> spear phishing, this method allows criminals to create more convincing emails. For example, an attacker could send an email to a specific company informing it about an urgent issue. In the email, the attacker would suggest that the company checks the issue on its private network, which is basically a malicious link designed to capture the company\u2019s private information. And it&#8217;s easy to fall for this. In fact, <a href=\"https:\/\/rdetech.com\/phishing-scams-in-2019-how-to-stay-safe\/\">91 per cent<\/a> of targets get scammed via personalised emails.<\/p>\n<h2>6. Supply chain attacks are close to becoming our biggest cyber-threat<\/h2>\n<p>Both small- and large-scale business organisations are facing serious cybersecurity challenges, and supply chain attacks are one of the key threats. Almost every company today relies on third-party suppliers, and hackers are able to access companies\u2019 systems using those suppliers. For instance, in 2013, data from 110 million Target customers was stolen in a supply chain hack. With a phishing email sent to an employee working for Target\u2019s vendor, hackers were able to\u00a0<a href=\"https:\/\/www.supplychainbrain.com\/blogs\/1-think-tank\/post\/28787-supply-chain-cyber-attacks-are-escalating-are-all-your-doors-locked\">gain<\/a> access to customers\u2019 credit card information. In this case, the human factor turned out to be the biggest vulnerability. But hackers are getting smarter, and their techniques have become more advanced. Since companies heavily rely on third-party software, criminals are turning this to their advantage. They can, for instance, replace a software update with a malicious one. Without even detecting the malware, the vendor will send the update to targets and automatically infect their computer systems. Such attacks can cause huge financial losses. It\u2019s estimated that an average software supply chain attack costs around <a href=\"https:\/\/www.information-age.com\/crowdstrike-supply-chain-123473734\/\">$1.1 million<\/a>. So, it&#8217;s no wonder that software supply chain attacks are expected to become a major cyber-threat in the next two years.<\/p>\n<figure id=\"attachment_39071\" aria-describedby=\"caption-attachment-39071\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-39071 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Supply-chain-attacks.jpg\" alt=\"A broken metal chain with an x-ray of a human hand and lines of code in the background. \" width=\"800\" height=\"526\" \/><figcaption id=\"caption-attachment-39071\" class=\"wp-caption-text\">Both small- and large-scale business organisations are facing serious cybersecurity challenges, and supply chain attacks are one of the key threats.<\/figcaption><\/figure>\n<h2>7. Cyber-criminals are stepping up their game with botnets<\/h2>\n<p>To gain more control over our computer systems, hackers are turning to botnets. Botnets are developed to infect not just one device, but millions of them. After a computer gets infected with a virus, either sent through email or shared as a pop-up ad, it allows the hacker to remotely control the computer and attack other systems as well. Such incidents are becoming increasingly common around the world. In the second quarter of 2018, botnet attacks occurred in 74 countries. As Channel Partners <a href=\"https:\/\/www.channelpartnersonline.com\/2018\/07\/25\/botnets-causing-more-headaches-for-security-specialists\/\">reveals<\/a>, China, Hong Kong, and the US experienced most ot these attacks. The reason why botnets cause so much headache to cybersecurity specialists is <a href=\"https:\/\/www.pandasecurity.com\/mediacenter\/security\/what-is-a-botnet\/\">because<\/a> they\u2019ve advanced so much over time, so it\u2019s not easy to detect whether your computer system has been infected with such a virus. And as this tech continues to develop, it will become even harder to identify.<\/p>\n<h2>8. Malicious bots are impacting the global economy<\/h2>\n<p>The number of mobile tech users is growing at a steady pace. And just like any other technology today, mobile tech isn\u2019t immune to cyber-threats, either. What seems to be the biggest cyber risk for mobile devices nowadays are mobile bots, malicious programs that allow hackers to go about their criminal ways \u2013 like taking over your account or stealing your identity. <a href=\"https:\/\/www.nbcbayarea.com\/news\/local\/Millions-of-Mobile-Phones-Hosting-Bad-Bots-Helping-Hackers-Commit-Crime-486630651.html\">According to<\/a> a study released by the San Francisco-based firm Distil Networks, 5.8 per cent of mobile devices used worldwide are infected with these programs. The same study reveals that at least 15 million devices in the US are infected with mobile bots. The biggest problem is that these bad bots are designed to operate in secrecy, so users often don\u2019t even realise their device is being used for malicious activities. Another potential use for mobile bots is <a href=\"https:\/\/www.shieldsquare.com\/what-is-price-scraping\/\">price scraping<\/a>, through which hackers can acquire pricing data from e-commerce websites. All this <a href=\"https:\/\/www.nbcbayarea.com\/news\/local\/Millions-of-Mobile-Phones-Hosting-Bad-Bots-Helping-Hackers-Commit-Crime-486630651.html\">has<\/a> a measurable effect on the world economy.<\/p>\n<h2>9. IoT botnets could lead to power grid failures<\/h2>\n<p>IoT innovations give us greater control over our homes and cities, but as we enjoy ever greater convenience, the risks of cybersecurity issues also increase. Recently, a group of researchers from Princeton University revealed that hackers could use electricity-consuming devices connected to the internet to attack the power grid and cause blackouts. <a href=\"https:\/\/www.bitdefender.com\/box\/blog\/iot-news\/madiot-iot-botnet-launch-major-attack-power-grid\/\">Referred to as<\/a> \u201cmanipulation of demand via IoT\u201d (MadIoT), such an attack targets the power demand side rather than the supply side. The researchers claim that hackers could create an imbalance between demand and supply by turning a lot of IoT devices on or off at the same time. This can disrupt the performance of generators at power plants and eventually lead to blackouts. A simulation model shows that a <a href=\"https:\/\/www.bitdefender.com\/box\/blog\/iot-news\/madiot-iot-botnet-launch-major-attack-power-grid\/\">30 per cent<\/a> increase in power demand can lead to generator failure. MadIoT attacks use botnets to take control of high-wattage IoT devices like heaters or air conditioners. Botnets can easily be replicated and are hard to detect, which <a href=\"https:\/\/www.secureworldexpo.com\/industry-news\/blackout-scenario-power-grid-vulnerable-to-new-type-of-cyber-attack\">makes<\/a> MadIoT attacks even more appealing to hackers.<\/p>\n<figure id=\"attachment_41003\" aria-describedby=\"caption-attachment-41003\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-41003\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Untitled-Project-36.jpg\" alt=\"\" width=\"800\" height=\"361\" \/><figcaption id=\"caption-attachment-41003\" class=\"wp-caption-text\">\u201cIoT botnet activity accounted for 78% of malware detection events in communication service provider (CSP) networks in 2018 \u2026 That is up sharply from 33% in 2016 when IoT botnets were first seen in meaningful numbers,\u201d Nokia\u2019s Threat Intelligence Report 2019 reveals.<\/figcaption><\/figure>\n<h2>10. Torii, the most sophisticated botnet ever created<\/h2>\n<p>As botnet tech keeps advancing, it\u2019s easy to understand why botnets are seen as one of the biggest cyber-threats to our society. At the end of 2017, researchers from Avast witnessed the activation of a new and highly sophisticated IoT botnet <a href=\"https:\/\/securityaffairs.co\/wordpress\/76659\/malware\/torii-iot-botnet.html\">called<\/a> Torii. This malware strain operates on a wide range of devices and digital architectures. Once a computer, smartphone, or tablet gets infected with Torii, the hacker is able to steal sensitive data from the device, execute codes, and deliver commands to the device through encryption. Unlike other botnets, Torii uses more sophisticated techniques to take over the compromised device. Torii can\u2019t be easily detected, and to maintain its presence, it <a href=\"https:\/\/www.csoonline.com\/article\/3310222\/security\/new-vicious-torii-iot-botnet-discovered.html\">uses<\/a> six different methods that are all executed. <a href=\"https:\/\/securityaffairs.co\/wordpress\/76659\/malware\/torii-iot-botnet.html\">According to<\/a> analysis conducted by the cybersecurity expert Marco Ramilli, Torri\u2019s \u201csophistication is a level above anything we have seen before\u201d.<\/p>\n<h2>11. A powerful IoT botnet is capable of surviving reboots<\/h2>\n<p>One of the common ways of removing malware from smart devices, routers, or modems is to simply reboot the device and have the memory wiped clean. That would bring the device back to its original state and prepare it for use again. But a new type of malicious IoT botnet, called Hide and Seek, can survive reboots and simply infects the device over and over again \u2013 a previously <a href=\"https:\/\/www.2-viruses.com\/first-botnet-survives-the-reboots\">unseen<\/a> feature that threatens to wreak havoc. The Hide and Seek botnet has already infected <a href=\"https:\/\/www.2-viruses.com\/first-botnet-survives-the-reboots\">around<\/a> 90,000 unique devices since January 2018 and could eventually be used for information theft, espionage, and extortion. And worse still, hackers are continuously enhancing its features. Bogdan Botezatu, a cybersecurity analyst, <a href=\"https:\/\/labs.bitdefender.com\/2018\/01\/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild\/\">warns<\/a> that \u201cthe botnet is undergoing constant redesign and rapid expansion\u201d as it seeks to use infected devices to scan for other potential targets.<\/p>\n<figure id=\"attachment_39075\" aria-describedby=\"caption-attachment-39075\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-39075 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/A-powerful-IoT-botnet-is-capable-of-surviving-reboots.jpg\" alt=\"Red lines of code on a black background, with the word \u2018BOTNET\u2019 written in the middle. \" width=\"800\" height=\"526\" \/><figcaption id=\"caption-attachment-39075\" class=\"wp-caption-text\">One of the common ways of removing malware from smart devices, routers, or modems is to simply reboot the device and have the memory wiped clean.<\/figcaption><\/figure>\n<h2>12. Stealing processing power to produce cryptocurrencies<\/h2>\n<p>Creating cryptocurrencies through a process known as \u2018mining\u2019 requires massive computing power and leads to high energy bills. So instead of doing all the heavy-lifting themselves, hackers have found a way to steal processing power by planting malware in people\u2019s computers and smart devices. The only warning signal of infection, though, is reduced performance. These attacks, known as \u2018cryptojacking\u2019, are rapidly <a href=\"https:\/\/www.ccn.com\/cryptojacking-attack-forces-canadian-university-to-shut-down-entire-network\">growing<\/a> in frequency, as 59 per cent of organisations \u201chave detected cryptomining malware on their systems at some point\u201d and most detections occurred in the last six months.<\/p>\n<figure id=\"attachment_41007\" aria-describedby=\"caption-attachment-41007\" style=\"width: 400px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-41007\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Tabela-9.jpg\" alt=\"Graphic showing percentage of organisations that have detected cryptomining software\" width=\"400\" height=\"128\" \/><figcaption id=\"caption-attachment-41007\" class=\"wp-caption-text\">As much as 59 per cent of organisations have been targeted by crypromining malware<\/figcaption><\/figure>\n<p>Hackers are also becoming increasingly creative when it comes to planting malware. For instance, some disguise crypto-mining software as fake Adobe updates. They even <a href=\"https:\/\/www.ccn.com\/cryptojacking-attack-forces-canadian-university-to-shut-down-entire-network\/\">target<\/a> universities such as St. Francis Xavier University in Canada. Following the attack, this university had to shut down its network for a week to clean up the system. As long as the value of cryptocurrencies keeps growing, cryptojacking will <a href=\"https:\/\/www.forbes.com\/sites\/rachelwolfson\/2018\/11\/13\/cryptojacking-on-the-rise-webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/#4c190b29c336\">remain<\/a> a threat.<\/p>\n<h2>13. Russian WebCobra malware hijacks computers to mine crypto-coins<\/h2>\n<p>McAfee Labs, an internet security provider and a research lab, recently discovered new cryptojacking malware named WebCobra that apparently <a href=\"https:\/\/www.cryptoglobe.com\/latest\/2018\/11\/new-russian-cryptojacking-malware-adapts-to-users-machines-report\/\">originates<\/a> from Russia. Once planted into a victim\u2019s computer, the malware steals processing power so that the hacker can run its crypto-mining software to <a href=\"https:\/\/www.cryptoglobe.com\/latest\/2018\/11\/new-russian-cryptojacking-malware-adapts-to-users-machines-report\/\">produce<\/a> Monero and Zcash cryptocurrencies. It\u2019s unique in its ability to learn about the victim\u2019s computer and deploy different codes for different operating systems. The only sign of malware is reduced performance of the infected computer and increased power consumption. The rise in \u2018cryptojacking\u2019 of this sort <a href=\"https:\/\/www.forbes.com\/sites\/rachelwolfson\/2018\/11\/13\/cryptojacking-on-the-rise-webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\/1#56cf70f8c336\">occurred<\/a> at a time of rising cryptocurrency value, enabling hackers to sell the digital coins they mined for significant sums of money. In fact, mining malware cases have <a href=\"https:\/\/cointelegraph.com\/news\/mcafee-labs-warns-over-new-russian-monero-cryptojacking-malware-webcobra\">increased<\/a> by almost 500 per cent in 2018 across the globe, and WebCobra has <a href=\"https:\/\/www.cryptoglobe.com\/latest\/2018\/11\/new-russian-cryptojacking-malware-adapts-to-users-machines-report\/\">infected<\/a> users in the US, South Africa, and Brazil and will remain a significant security threat.<\/p>\n<p><iframe title=\"What is &#039;cryptojacking&#039;?\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/nlXQZrSExeI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>14. The fileless crypto-miner PowerGhost is raiding corporate networks<\/h2>\n<p>A new type of crypto-mining malware, dubbed PowerGhost, was discovered by researchers from the cybersecurity and antivirus provider Kaspersky Lab. Much like WebCobra, it also infects computers and uses their processing power to produce cryptocurrencies for hackers. But unlike similar malicious programs, PowerGhost is actually fileless and doesn\u2019t store mining software directly onto a disk, making it hard to detect. It can also automatically self-update and is designed to spread across the local network by copying itself. For now, the primary targets of PowerGhost have been corporations in Brazil, Columbia, India, and Turkey and not individual users. Kaspersky Lab <a href=\"https:\/\/www.itweb.co.za\/content\/KA3WwqdlRDXqrydZ\">warns<\/a> that \u201cAs this trend grows, enterprises will be put at risk, as miners sabotage and slow down their computer networks, damaging overall business processes and lining their own pockets in the process.\u201d Companies are advised to ramp up their cybersecurity, keep all software updated, and educate employees on the best IT protection measures.<\/p>\n<figure id=\"attachment_39077\" aria-describedby=\"caption-attachment-39077\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-39077 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/crypto.jpg\" alt=\"A miner surrounded by computer chips literally mining Bitcoin. \" width=\"800\" height=\"526\" \/><figcaption id=\"caption-attachment-39077\" class=\"wp-caption-text\">A new type of crypto-mining malware, dubbed PowerGhost, was discovered by researchers from the cybersecurity and antivirus provider Kaspersky Lab.<\/figcaption><\/figure>\n<h2>15. Public services are under threat from ransomware attacks<\/h2>\n<p>Ransomware attacks have been plaguing the internet for the past few years, and this trend is set to continue in the future. Hackers use ransomware programs to encrypt user files and demand payment in exchange for the keys that unlock the data. But instead of spreading malware to as many computers as possible, attackers <a href=\"https:\/\/www.secplicity.org\/2018\/11\/19\/2019-security-predictions-utilities-and-industrial-control-systems-targeted-with-ransomware\/\">will<\/a> focus more on a smaller group of more profitable targets such as hospitals, public utilities, and other institutions that deliver key public services. By causing a power outage or shutting off the water supply, they hope to force these organisations to pay large sums of money. For instance, the Hollywood Presbyterian Medicare Center <a href=\"https:\/\/www.secplicity.org\/2018\/11\/19\/2019-security-predictions-utilities-and-industrial-control-systems-targeted-with-ransomware\/\">paid<\/a> hackers $17,000 in 2016 to regain control of their system. And as hackers exploit these vulnerabilities, their average payment demand is <a href=\"https:\/\/www.secplicity.org\/2018\/11\/19\/2019-security-predictions-utilities-and-industrial-control-systems-targeted-with-ransomware\/\">expected<\/a> to increase by 6,500 per cent this year, \u201cfrom an average of $300 to $20,000 per payment\u201d.<\/p>\n<h2>16. Hackers might put smart cities under \u2018cyber-siege\u2019<\/h2>\n<p>A ransomware attack on the City of Atlanta\u2019s digital operations in March 2018 showed just how vulnerable smart city infrastructure can be. Websites <a href=\"https:\/\/www.smartcitiesworld.net\/special-reports\/special-reports\/following-ransomware-hack-atlanta-shares-cybersecurity-takeaways-for-other-cities\">were<\/a> shut down, bill-paying services turned off, and police dashcam video recordings wiped out. The sustained damage amounted to <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/atlanta-ransomware-recovery-cost-now-at-17-million-reports-say\/\">$17 million<\/a>, but the authorities <a href=\"https:\/\/www.smartcitiesworld.net\/special-reports\/special-reports\/following-ransomware-hack-atlanta-shares-cybersecurity-takeaways-for-other-cities\">refused<\/a> to pay the $51,000 ransom demand. Instead, they decided to take the hit, pay cyber experts to regain control over the system, and improve cybersecurity to prevent similar breaches in the future. A similar attack also <a href=\"https:\/\/www.smartcitiesdive.com\/news\/port-of-san-diego-cyberattack-ransomware\/538476\/\">struck<\/a> the Port of San Diego in October 2018, forcing its staff to deactivate a part of the port\u2019s system. The FBI and the Department of Homeland Security are still investigating the incident. These attacks demonstrate that while cities are becoming smarter in an attempt to provide better services to their growing populations, they fall short in efficiently protecting their digital infrastructure. To minimise the risk of further attacks, cities urgently <a href=\"https:\/\/go.forrester.com\/blogs\/predictions-2019-iot-devices\/\">need<\/a> to invest in cybersecurity defenses.<\/p>\n<h2>17. Ransomware-as-a-Service makes cyber blackmail a lot easier<\/h2>\n<p>The costs related to ransomware damage are projected to <a href=\"https:\/\/www.csoonline.com\/article\/3237674\/ransomware\/ransomware-damage-costs-predicted-to-hit-115b-by-2019.html\">grow<\/a> to $11.5 billion this year, and Ransomware-as-a-Service (RaaS) plays a significant role in this trend. RaaS enables hackers to sell malware to other, less tech-savvy criminals, helping them to encrypt victims\u2019 data and demand payments. Criminals can pay a fee to use the malware or split the victims\u2019 payment with the hackers. For instance, Philadelphia, a ransomware hacking kit, was <a href=\"https:\/\/www.zdnet.com\/article\/will-your-business-be-next-customisable-ransomware-makes-it-easy-for-cybercriminals-to-target\/\">used<\/a> to target highly specific organisations such as hospitals. Rainmaker Labs, the group behind Philadelphia, even uploaded a product walkthrough video on YouTube. Meanwhile, new types of RaaS tools are regularly hitting the market, including Saturn, a ransomware kit that requires no upfront payment as developers <a href=\"https:\/\/www.arcserve.com\/insights\/2018-ransomware-trends\/\">take<\/a> a 30 per cent cut of the ransom payments. And as more and more criminals start to use RaaS software, we can <a href=\"https:\/\/www.arcserve.com\/insights\/2018-ransomware-trends\/\">expect<\/a> an increase in ransomware attacks, making cyber protection a critical task for companies and individual users alike.<\/p>\n<h2>18. Ransomware hackers exploit human psychology<\/h2>\n<p>As if encrypting people\u2019s data and demanding a payment wasn\u2019t diabolical enough, some ransomware hackers have added a new twist. Popcorn Time ransomware, for instance, named after <a href=\"https:\/\/www.arcserve.com\/insights\/2018-ransomware-trends\/\">but unrelated to a bittorrent movie site, offers<\/a> its victims three choices: pay the ransom, lose data, or \u201cinfect two other people in exchange for your decryption key\u201d. This creates a moral dilemma and touches upon basic human instincts <a href=\"https:\/\/www.wired.com\/2016\/12\/popcorn-time-ransomware\/\">such<\/a> as selfishness and \u2018eat-or-be-eaten\u2019. On a macro level, it also forces people to rethink whether infecting others or even paying the ransom, and thus encouraging hackers to ramp up attacks, is worth the damage it inflicts upon society.<\/p>\n<figure id=\"attachment_41015\" aria-describedby=\"caption-attachment-41015\" style=\"width: 400px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-41015\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Untitled-Project-38.jpg\" alt=\"Image showing the number of systems and countries affected by the WannaCry Ransom Attack in 2017, as well as the ransom amount\" width=\"400\" height=\"148\" \/><figcaption id=\"caption-attachment-41015\" class=\"wp-caption-text\">More than 220,000 systems were affected by the WannaCry Ransom Attack in 2017, spread across 150 countries, with the ransom set at $300.<\/figcaption><\/figure>\n<p>Besides this, businesses blackmailed by ransomware have to take into account the fate of employees and their families in case if they refuse to pay and critical data is lost. Regardless of whether Popcorn Time succeeds in exploiting human psychology, it\u2019s an example of increasingly creative and sophisticated tactics hackers deploy in an attempt to threaten people and extort money.<\/p>\n<h2>19. Highly effective fileless malware attacks are on the rise<\/h2>\n<p><a href=\"https:\/\/www.carbonblack.com\/resources\/definitions\/what-is-fileless-malware\/\">Almost<\/a> 80 per cent of successful attacks in 2017 were carried out using fileless malware, a type of malicious software that doesn\u2019t store files onto a disk but runs them in the memory. For instance, it hijacks the Windows shell and script language PowerShell to execute commands and infect other machines. And since fileless malware isn\u2019t installed in a typical way and uses trusted programs to run, it\u2019s hard to <a href=\"https:\/\/www.carbonblack.com\/resources\/definitions\/what-is-fileless-malware\/\">detect<\/a>. \u201cTwo thirds of security researchers said they were not confident legacy antivirus software could protect their organizations\u201d. That\u2019s why cybersecurity companies are turning to machine learning and other cutting-edge technologies to combat this threat. Hackers use the fileless technique for various purposes, such as <a href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/powershell-threats-grow-further-and-operate-plain-sight\">deploying<\/a> \u201cfinancial Trojans and cryptocurrency miners\u201d, and these attacks are reportedly <a href=\"https:\/\/www.carbonblack.com\/resources\/definitions\/what-is-fileless-malware\/\">increasing<\/a> by seven per cent per month. And as their effectiveness is well-documented, it\u2019s <a href=\"https:\/\/www.sensorsmag.com\/embedded\/2019-security-predictions-likely-to-audacious\">likely<\/a> that more and more of these sophisticated fileless attacks will be launched worldwide in the future.<\/p>\n<h2>20. Facial recognition systems and touch ID sensors aren\u2019t as secure as we think<\/h2>\n<p>Biometric data such as fingerprints and facial images are considered a more secure method of authentication than traditional passwords. But they, too, can be stolen and misused, <a href=\"https:\/\/www.prnewswire.com\/news-releases\/biometric-hacking-and-cloud-attacks-among-top-cyberthreats-for-2019-300758532.html\">warns<\/a> Experian, a consumer credit reporting agency. In fact, researchers at New York University have <a href=\"https:\/\/findbiometrics.com\/fake-master-key-fingerprints-can-fool-systems-researchers-511191\/\">developed<\/a> AI software that\u2019s capable of fooling fingerprint protection systems around 20 per cent of the time. And security experts at Bkav, a Vietnam-based tech corporation, claim they\u2019ve tricked iPhone X\u2019s Facial ID by creating a composite mask of a victim\u2019s face. Biometric data can also be stolen on a mass scale. For instance, hackers <a href=\"https:\/\/www.bankinfosecurity.com\/blogs\/facial-recognition-big-trouble-big-data-biometrics-p-2639\">stole<\/a> 5.6 million fingerprints from the US Office of Personnel Management, proving that determined hackers with sufficient resources and enough time can hack just about anything. Emboldened by these successes, cyber-criminals are poised to increasingly focus on biometric hacking and expose the vulnerabilities of existing security systems.<\/p>\n<figure id=\"attachment_39079\" aria-describedby=\"caption-attachment-39079\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-39079 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Facial-recognition-systems-and-touch-ID-sensors-aren\u2019t-as-secure-as-we-think.jpg\" alt=\"A woman using facial recognition technology on her smartphone, on a yellow background. \" width=\"800\" height=\"526\" \/><figcaption id=\"caption-attachment-39079\" class=\"wp-caption-text\">Biometric data such as fingerprints and facial images are considered a more secure method of authentication than traditional passwords.<\/figcaption><\/figure>\n<h2>21. Protecting systems with biometric data alone is a major risk factor<\/h2>\n<p>Using biometric data such as fingerprints, faces, voices, or irises as the only authentication factor puts users at great risk. After all, this data is often in the public domain. People <a href=\"https:\/\/www.bayometric.com\/risk-factors-associated-biometric-identification\/\">leave<\/a> fingerprints everywhere, and our pictures are all over social media, in governmental databases, and many other places. Hackers can use all of these to recreate our biometric features for criminal activities. Nevertheless, solving this issue is surprisingly simple and involves adding one or two more layers of authentication such as complex passwords and limiting login based on the IP address or device type. Despite the obvious advantages of two- or multi-factor authentication, a significant number of people will most likely keep <a href=\"https:\/\/www.secplicity.org\/2018\/11\/29\/2019-security-predictions-biometrics-as-single-factor-authentication-exploited-by-attackers\/\">using<\/a> single-factor biometric authentication and hackers are <a href=\"https:\/\/www.secplicity.org\/2018\/11\/29\/2019-security-predictions-biometrics-as-single-factor-authentication-exploited-by-attackers\/\">expected<\/a> to \u201ctake advantage of their naivet\u00e9 and pull off major biometric hacks\u201d.<\/p>\n<h2>22. State-sponsored cyber-attacks are bound to increase<\/h2>\n<p>Pulling off a major cyber-attack often requires resources that individual hackers can rarely afford. Many large-scale attacks are therefore sponsored by states well-known for this type of behaviour, <a href=\"https:\/\/www.atlantisuniversity.edu\/what-type-of-cyberattacks-can-we-expect-for-2018-2019\/\">such<\/a> as China, Russia, Iran, Israel, North Korea, and the US. Governments and intelligence agencies rely on hacking to acquire high-value political, industrial, and military data as well as to disrupt electronic voting systems and manipulate public opinion. Authorities are increasingly vigilant in the fight against these threats. The US, for instance, has banned the use of Kaspersky software in government agencies, <a href=\"https:\/\/www.atlantisuniversity.edu\/what-type-of-cyberattacks-can-we-expect-for-2018-2019\/\">accusing<\/a> this antivirus provider of being under Kremlin\u2019s influence. The UN is planning to implement a Cyber Security Treaty to address the problem of state-sponsored cyber-attacks. Not everyone is convinced this will work, however, and the cybersecurity expert Ian Kilpatrick <a href=\"https:\/\/www.information-management.com\/list\/10-top-cybersecurity-predictions-for-2019\">argues<\/a> that \u201cnation-state sponsored espionage, cyber-crime and sabotage will continue to expand\u201d.<\/p>\n<figure id=\"attachment_39081\" aria-describedby=\"caption-attachment-39081\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-39081 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/State-sponsored-cyber-attacks-are-bound-to-increase.jpg\" alt=\"A person in a hoodie with their face covered, with a digital computer keyboard next to them and lines of code in the background. \" width=\"800\" height=\"526\" \/><figcaption id=\"caption-attachment-39081\" class=\"wp-caption-text\">Governments and intelligence agencies rely on hacking to acquire high-value political, industrial, and military data as well as to disrupt electronic voting systems and manipulate public opinion.<\/figcaption><\/figure>\n<h2>23. AI-driven malware mimics the behaviour of human hackers<\/h2>\n<p>When we think of cyber-attacks, the first image that springs to mind is a hacker sitting in front of a computer, trying to gain access to someone\u2019s files. While many hacks are still performed by individuals, they\u2019re becoming increasingly refined, and yes, automated. Researchers from the AI company Darktrace <a href=\"https:\/\/tech.newstatesman.com\/security\/ai-powered-cyber-attacks-darktrace\">claim<\/a> that AI-based cyber-attacks have evolved, making it difficult for security experts to distinguish AI-powered attacks from those performed by humans. As the researchers reveal, malicious AI software can imitate the behaviour of human hackers to avoid detection. A team from Darktrace envisioned several scenarios in which a computer is infected with AI malware \u2013 a virus that observes the computer\u2019s behaviour and environment and adapts accordingly. In one of the scenarios, the AI malware was used to steal data from a company specialising in medical technology. This was done slowly and in phases, so it was almost impossible to detect that anything strange had happened. Researchers <a href=\"https:\/\/tech.newstatesman.com\/security\/ai-powered-cyber-attacks-darktrace\">warn<\/a> that \u201cdefensive cyber AI is the only chance to prepare\u201d for these scenarios.<\/p>\n<h2>24. AI \u2013 the most efficient hacking tool<\/h2>\n<p>The benefits of artificial intelligence are well-known. Besides automating various industries, AI can also help organisations detect cybersecurity risks. In fact, <a href=\"https:\/\/www.atlantisuniversity.edu\/what-type-of-cyberattacks-can-we-expect-for-2018-2019\/\">87 per cent<\/a> of cybersecurity professionals in the US rely on AI. Of course, this tech can also easily fall into the wrong hands. Research <a href=\"https:\/\/www.atlantisuniversity.edu\/what-type-of-cyberattacks-can-we-expect-for-2018-2019\/\">shows<\/a> that 91 per cent of cybersecurity professionals are concerned about hackers using AI to conduct more complex cybercrime.<\/p>\n<figure id=\"attachment_41021\" aria-describedby=\"caption-attachment-41021\" style=\"width: 400px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-41021\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Tabela-6.jpg\" alt=\"Visual representation of how many cybersecurity professionals in the US rely on AI, as well as how many of them are concerned about AI being used for crime, displayed in percentages.\" width=\"400\" height=\"189\" \/><figcaption id=\"caption-attachment-41021\" class=\"wp-caption-text\">87 per cent of cybersecurity professionals in the United States use AI, while 91 per cent fear AI could be exploited by cyber criminals to conduct more serious crimes.<\/figcaption><\/figure>\n<p>To reveal threats associated with AI cyber-attacks, IBM Research <a href=\"https:\/\/securityintelligence.com\/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware\/\">developed<\/a> \u2018DeepLocker\u2019 \u2013 malware that conceals its intent until it reaches a specific victim. Most malicious viruses usually attack an unspecified number of computers, but DeepLocker is a bit different. It harnesses the power of AI to stealthily reach the right target, after which it infects the victim\u2019s computer system. Thanks to facial recognition tech, geolocation, or speech recognition, DeepLocker can identify the owner of the device, and only then <a href=\"https:\/\/www.techrepublic.com\/article\/how-weaponized-ai-creates-a-new-breed-of-cyber-attacks\/\">decide<\/a> whether to attack the system.<\/p>\n<h2>25. Self-driving vehicles are also prone to hacking<\/h2>\n<p>Our computers, smartphones and other smart devices aren\u2019t the only ones that can be hacked. The same can happen \u2013 and has already happened \u2013 to (autonomous) vehicles. Back in 2015, two researchers <a href=\"https:\/\/www.pri.org\/stories\/2017-04-20\/what-if-someone-could-hack-driverless-car-and-slam-brakes\">managed<\/a> to hack a Jeep Cherokee and take control of its steering wheel. This particular experiment was conducted on a non-self-driving car, but that doesn\u2019t mean autonomous vehicles are immune to similar attacks. <a href=\"https:\/\/www.wardsauto.com\/autonomous-vehicles\/autonomous-cars-more-vulnerable-hacking-expert-says\">According to<\/a> Bryson Bort, the founder of the cybersecurity consultancy Grimm, there are two ways to hack a self-driving car. The first is through physical contact with the car, and the second is remotely, via the internet. As Bort <a href=\"https:\/\/www.wardsauto.com\/autonomous-vehicles\/autonomous-cars-more-vulnerable-hacking-expert-says\">explains<\/a> \u2013 and as you can imagine \u2013 hacking a car can cause untold damage and chaos. A hacker accessing a vehicle\u2019s system can manipulate the car\u2019s behaviour, leading to accidents and loss of life.<\/p>\n<h2>Cybersecurity in the future<\/h2>\n<p>While we\u2019re reaping the benefits of smart tech and digitalisation, we should also be aware of the risk of cyber-attacks. Privacy concerns and frequent data security breaches are pressuring developers to think ahead and work out solutions to prevent cyber-attacks. This, however, is a real challenge. As technologies keep maturing and morphing into super-intelligent, almost self-sustainable systems, it will become more difficult to predict how, where, and when malicious cyber-threats could occur.<\/p>\n<p>What if someone hacks our AI-powered car? What if a smart computer virus starts learning and acting completely independently? In theory, we\u2019d be able to teach smart programs to detect other clever programs with malicious intent and react accordingly, but this will be an ongoing \u2018battle royale\u2019 between intelligent programs. For now, prevention, detection, and counteraction are still the best measures against cyber-attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Connectedness is the future \u2013 our homes, organisations, and even entire cities have undergone an extreme smart tech transformation in recent years. Intelligent infrastructure facilitates increasing digitalisation, and we\u2019re swiftly abandoning outdated practices, replacing them with ever more efficient ones. Paperwork is increasingly replaced with digital files and the gathered data is stored on various [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":45909,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4403,4349,4218],"article-type":[],"trends":[],"class_list":["post-58075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-cyber-crime","tag-cyberattack","tag-future"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>25 cyber-threats to fear - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"To help you counter the threat posed by hackers and safely use smart tech, we\u2019ve compiled a list of 25 key cyber-threats you should be wary of. &amp;#x2705\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"25 cyber-threats to fear - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"To help you counter the threat posed by hackers and safely use smart tech, we\u2019ve compiled a list of 25 key cyber-threats you should be wary of. &amp;#x2705\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T07:53:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1149627236.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"25 cyber-threats to fear\",\"datePublished\":\"2019-02-14T22:00:00+00:00\",\"dateModified\":\"2021-06-07T07:53:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/\"},\"wordCount\":4913,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1149627236.jpg\",\"keywords\":[\"cyber crime\",\"cyberattack\",\"future\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/\",\"name\":\"25 cyber-threats to fear - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1149627236.jpg\",\"datePublished\":\"2019-02-14T22:00:00+00:00\",\"dateModified\":\"2021-06-07T07:53:23+00:00\",\"description\":\"To help you counter the threat posed by hackers and safely use smart tech, we\u2019ve compiled a list of 25 key cyber-threats you should be wary of. &#x2705\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1149627236.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1149627236.jpg\",\"width\":800,\"height\":526,\"caption\":\"By 2020, nearly $102 billion is expected to be spent by organisations on cybersecurity software, hardware, and services for protection against cyber-threats.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/25-cyber-threats-to-fear\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"25 cyber-threats to fear\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"25 cyber-threats to fear - Richard van Hooijdonk Blog","description":"To help you counter the threat posed by hackers and safely use smart tech, we\u2019ve compiled a list of 25 key cyber-threats you should be wary of. &#x2705","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/","og_locale":"en_US","og_type":"article","og_title":"25 cyber-threats to fear - Richard van Hooijdonk Blog","og_description":"To help you counter the threat posed by hackers and safely use smart tech, we\u2019ve compiled a list of 25 key cyber-threats you should be wary of. &#x2705","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2019-02-14T22:00:00+00:00","article_modified_time":"2021-06-07T07:53:23+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1149627236.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"25 cyber-threats to fear","datePublished":"2019-02-14T22:00:00+00:00","dateModified":"2021-06-07T07:53:23+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/"},"wordCount":4913,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1149627236.jpg","keywords":["cyber crime","cyberattack","future"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/","name":"25 cyber-threats to fear - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1149627236.jpg","datePublished":"2019-02-14T22:00:00+00:00","dateModified":"2021-06-07T07:53:23+00:00","description":"To help you counter the threat posed by hackers and safely use smart tech, we\u2019ve compiled a list of 25 key cyber-threats you should be wary of. &#x2705","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1149627236.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1149627236.jpg","width":800,"height":526,"caption":"By 2020, nearly $102 billion is expected to be spent by organisations on cybersecurity software, hardware, and services for protection against cyber-threats."},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/25-cyber-threats-to-fear\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"25 cyber-threats to fear"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/58075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=58075"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/58075\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/45909"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=58075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=58075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=58075"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=58075"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=58075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}